Wednesday, September 18, 2024
HomeCryptocurrency hackChrome Extension Caught Silently Mining CryptoCurrency without Users Knowledge

Chrome Extension Caught Silently Mining CryptoCurrency without Users Knowledge

Published on

Cryptocurrency Miners are in the raise starting from last year, more than 500 million computers are mining cryptoCurrency in their browsers without the user’s knowledge and now the chrome extension Archive Poster.

Websites involved in crypto-mining by injecting mining scripts into visitors browsers and most popular among them is Coinhive which offers a JavaScript miner for the Monero Blockchain that can be embedded into other Web sites.

Now even the Chrome extension started mining cryptocurrency, a chrome extension Archive Poster with more than 105,000 users Caught injecting an in-browser cryptocurrency miner.

- Advertisement - EHA

Archive Poster is an extension used to repost the Tumblr blogs, according to the users review the extension includes the most famous coinhive source code starting from the December.

The extension consists of a hidden Coinhive crypto jacker and it won’t ask any permissions before abusing the user’s CPU resource.

The largest torrent search engine, the Pirate Bay, that made CoinHive famous by being caught using it. Last week another Cryptocurrency Miner spotted using chrome version of facebook messenger to mine Cryptocurrency.

Temporary Defense – Archive Poster

Temporary defense is to trash the extension from Chrome which halts the mining process.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader

UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN...

Microsoft Windows Kernel Vulnerability Exploited in the Wild

Microsoft has confirmed the exploitation of a Windows Kernel vulnerability, identified as CVE-2024-37985, in...

Discord Announces End-to-End Encryption for Audio & Video Chats

Discord has introduced end-to-end encryption (E2EE) for audio and video chats.Known as the...

Threat Actor Allegedly Selling Bharat Petroleum Database

A threat actor has allegedly put up for sale a database belonging to Bharat...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks

Hackers usually shift their attention towards Atlassian due to flaws in its software, especially...

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware

Recent attacks exploit the Log4j vulnerability (Log4Shell) by sending obfuscated LDAP requests to trigger...

Hackers Abused StackExchange Platform To Deliuver Malicious Python Package

Attackers uploaded malicious Python packages targeting Raydium and Solana users to PyPI, leveraging a...